First published: Wed Mar 17 2021(Updated: )
The Debian shadow package before 1:4.5-1 for Shadow incorrectly lists pts/0 and pts/1 as physical terminals in /etc/securetty. This allows local users to login as password-less users even if they are connected by non-physical means such as SSH (hence bypassing PAM's nullok_secure configuration). This notably affects environments such as virtual machines automatically generated with a default blank root password, allowing all local users to escalate privileges.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Debian shadow | =4.4 | |
Debian Debian Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-20002 is a vulnerability in the Debian shadow package that allows users to login as password-less users even if they are connected by non-physical means.
The severity of CVE-2017-20002 is high with a severity value of 7.8.
CVE-2017-20002 affects the Debian shadow package by incorrectly listing pts/0 and pts/1 as physical terminals in /etc/securetty, allowing local users to login without a password.
To fix CVE-2017-20002, update the Debian shadow package to version 1:4.5-1 or later.
You can find more information about CVE-2017-20002 at the following references: [link1], [link2], [link3].